An Overall Cost-effective Authentication Technique for the Global Mobility Network

Designing an efficient and secure authentication technique to detect fraudulent behavior is a very important subject in mobile network systems. However, treating each transaction as a suspect seems to contradict the fact that most communication behaviors are honest. Based on this fact, it is reasonable to design a more efficient authentication protocol despite its loss of efficiency in dishonest communication situations. In such a way, an overall cost-effective solution can be obtained. In this paper, the BGSW protocol is redesigned under the concept and a cost-effective solution is shown. However, we have to emphasize that main purpose of this paper is not to improve the BGSW protocol, but to show the new idea that it is reasonable to design a more efficient authentication protocol despite its loss efficiency in dishonest communication situation.

[1]  Chi-Chun Lo,et al.  Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..

[2]  Chang‐Kuo Yeh,et al.  A dual‐purpose signature for authentication on UMTS , 2007 .

[3]  M. Rahnema,et al.  Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.

[4]  Martín Abadi,et al.  Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Wei-Bin Lee,et al.  A Self-Concealing Mechanism for Authentication of Portable Communication Systems , 2008, Int. J. Netw. Secur..

[6]  Levente Buttyán,et al.  Extensions to an authentication technique proposed for the global mobility network , 2000, IEEE Trans. Commun..

[7]  Shigefusa Suzuki,et al.  An Authentication Technique Based on Distributed Security Management for the Global Mobility Network , 1997, IEEE J. Sel. Areas Commun..

[8]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[9]  Nawal A. El-Fishawy,et al.  An effective approach for authentication of mobile users , 2002, Vehicular Technology Conference. IEEE 55th Vehicular Technology Conference. VTC Spring 2002 (Cat. No.02CH37367).

[10]  C. Laferriere,et al.  Authentication and authorization techniques in distributed systems , 1993, 1993 Proceedings of IEEE International Carnahan Conference on Security Technology.

[11]  Khalid Al-Tawil,et al.  A new authentication protocol for GSM networks , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).

[12]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[13]  Liu Zhi-meng An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .

[14]  Jeong-Hyun Park,et al.  Key distribution for secure VSAT satellite communications , 1997, ISCE '97. Proceedings of 1997 IEEE International Symposium on Consumer Electronics (Cat. No.97TH8348).

[15]  Min-Shiang Hwang,et al.  An efficient authentication protocol for GSM networks , 2000, IEEE/AFCEA EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security (Cat. No.00EX405).